• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Monthly Archive:: July 2017

Data Loss Prevention (DLP): Comprehensive control over business data

Data Loss Prevention (DLP): Comprehensive control over business data

Estimated reading time: 2 minutes

Data loss prevention (DLP) as the name suggests, protects the loss, misuse or unauthorized access of the sensitive data of your business. DLP software or products categorize and protect business data based on their confidentiality. It further prevents users...
Read Blog
July 28, 2017

3 Key Security Challenges for IoT

3 Key Security Challenges for IoT

Estimated reading time: 3 minutes

Internet of things (IoT) is no more just ‘the next big thing’ but has already started entering our lives in different forms. Today there are billions of devices from consumer products (e.g. Fitbit) to Industrial products (Industrial sensors) that...
Read Blog
July 27, 2017

5 Security Threats in Healthcare Industry – INFOGRAPHIC

5 Security Threats in Healthcare Industry – INFOGRAPHIC

Estimated reading time: < 1 minute

Technology has touched every aspect of our lives, be it using Google Maps to get to a new place or getting on a quick Skype call with a family physician. And amidst all the benefits that technology has delivered,...
Read Blog
July 27, 2017

Security Challenges in BYOD

Security Challenges in BYOD

Estimated reading time: 4 minutes

BYOD (Bring Your Own Device) refers to employees using their own devices including phones, tablets, and laptops to connect to the office network and perform their official duties. BYOD is the preferred policy of many employers these days, for...
Read Blog
July 25, 2017

Malware alert! Beware of the BTCWare Aleta Ransomware

Malware alert! Beware of the BTCWare Aleta Ransomware

Estimated reading time: 3 minutes

Quick Heal Security Labs has observed the entry of a new BTCWare ransomware (first observed at the beginning of 2017) variant called ‘Aleta’. This ransomware is called so because it appends a “.aleta” extension to files it encrypts in...
Read Blog
July 25, 2017

Why Education Institutions Need Security Software?

Why Education Institutions Need Security Software?

Estimated reading time: 4 minutes

If you think that schools and colleges don’t need any cyber security as they don’t store any data that will interest criminals, think again. In May 2015, Pennsylvania State University’s engineering school was the target of a cyber attack. The...
Read Blog
July 24, 2017

NemucodAES malspam is back and this time it brought along Kovter Trojan

NemucodAES malspam is back and this time it brought along Kovter Trojan

Estimated reading time: 3 minutes

For the last few weeks, we have been observing a new malicious spam (malspam) variant that is spreading via an email claiming to be from the United Parcel Service (UPS) carriages. The email carries a zip attachment that contains...
Read Blog
July 21, 2017

Cyber security challenges of the future

Cyber security challenges of the future

Estimated reading time: 3 minutes

As the cyber world is progressing , so are the threats around it. In the late 80’s and early 90’s, the threats were simple as compared to today’s standards. The viruses got transferred through infected floppies, but they were easy to detect and stop. Today,...
Read Blog
July 21, 2017

Security measures to be taken by FinTech startups to avoid cyber attacks

Security measures to be taken by FinTech startups to avoid cyber attacks

Estimated reading time: 4 minutes

The financial sector is one of the favorite targets of cyber criminals. The examples of a security breach in the financial world are available a dime a dozen. The latest one was the 81 million USD online robbery at...
Read Blog
July 20, 2017

Importance of information security in education sector

Importance of information security in education sector

Estimated reading time: 3 minutes

The education sector, especially institutions of higher education, have been the focus of Information Security Professionals in recent times. It has been observed that the education sector ranks very high in the list of targets for cyber-attacks. Investigations have...
Read Blog
July 19, 2017
1 2 3 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies